2021
DOI: 10.1007/978-3-030-89915-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Full Key Recovery Side-Channel Attack Against Ephemeral SIKE on the Cortex-M4

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…They measured the energy consumption, and also found whilst benchmarking their implementation that it was around 20% faster than previous implementations. It was found for the Cortex-M4 implementation of SIKE based on the reference implementation that a full recovery of keys was possible with a side-channel attack [41]. This brings to the fore the importance of implementation-specific security testing.…”
Section: Other Postquantum Testingmentioning
confidence: 99%
“…They measured the energy consumption, and also found whilst benchmarking their implementation that it was around 20% faster than previous implementations. It was found for the Cortex-M4 implementation of SIKE based on the reference implementation that a full recovery of keys was possible with a side-channel attack [41]. This brings to the fore the importance of implementation-specific security testing.…”
Section: Other Postquantum Testingmentioning
confidence: 99%
“…The zero-value threat was also hinted at in [GLK21], however the authors similarly conclude that such attacks would be blocked by partial ciphertext validation and do not explore the matter further. Thus, despite a general awareness of the possibility of zero-value attacks prior to this work, no one had ever demonstrated such an attack on SIDH or SIKE.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, there have been further advances in side-channel attacks (and protection) against implementations of SIDH. The reader is referred to [1,17,28,43] for more information.…”
Section: Fault Attacksmentioning
confidence: 99%